Cisco N7K-C7010 Configuration Guide - Page 21

Access Ports, Trunk Ports, Private VLAN Hosts and Promiscuous Ports, Routed Ports

Page 21 highlights

Chapter 1 Overview Information About Interfaces Send document comments to [email protected] Access Ports An access port carries traffic for one VLAN. This type of port is a Layer 2 interface only. For more information about access-port interfaces, see Chapter 3, "Configuring Layer 2 Interfaces." Trunk Ports A trunk port carries traffic for two or more VLANs. This type of port is a Layer 2 interface only. For more information about trunk-port interfaces, see Chapter 3, "Configuring Layer 2 Interfaces." Private VLAN Hosts and Promiscuous Ports Private VLANs (PVLANs) provide traffic separation and security at the Layer 2 level. A PVLAN is one or more pairs of a primary VLAN and a secondary VLAN, all with the same primary VLAN. The two types of secondary VLANs are called isolated and community VLANs. In an isolated VLAN, PVLAN hosts communicate only with hosts in the primary VLAN. In a community VLAN, PVLAN hosts communicate only among themselves and with hosts in the primary VLAN but not with hosts in isolated VLANs or in other community VLANs. Community VLANs use promiscuous ports to communicate outside the PVLAN. Regardless of the combination of isolated and community secondary VLANs, all interfaces within the primary VLAN comprise one Layer 2 domain and require only one IP subnet. You can configure a Layer 3 VLAN network interface, or switched virtual interface (SVI), on the PVLAN promiscuous port, which provides routing functionality to the primary PVLAN. For more information on configuring PVLAN host and PVLAN promiscuous ports and all other PVLAN configurations, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.x. Routed Ports A routed port is a physical port that can route IP traffic to another device. A routed port is a Layer 3 interface only and does not support Layer 2 protocols, such as Spanning Tree Protocol (STP). For more information on routed ports, see the "Routed Interfaces" section on page 4-2. Management Interface You can use the management Ethernet interface to connect the device to a network for remote management using a Telnet client, the Simple Network Management Protocol (SNMP), or other management agents. The management port (mgmt0) is autosensing and operates in full-duplex mode at a speed of 10/100/1000 Mb/s. For more information on the management interface, see the Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 5.x. You will also find information on configuring the IP address and default IP routing for the management interface in this document. OL-23435-03 Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.x 1-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308

Send document comments to [email protected]
1-3
Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.x
OL-23435-03
Chapter 1
Overview
Information About Interfaces
Access Ports
An access port carries traffic for one VLAN. This type of port is a Layer 2 interface only. For more
information about access-port interfaces, see
Chapter 3, “Configuring Layer 2 Interfaces.”
Trunk Ports
A trunk port carries traffic for two or more VLANs. This type of port is a Layer 2 interface only. For
more information about trunk-port interfaces, see
Chapter 3, “Configuring Layer 2 Interfaces.”
Private VLAN Hosts and Promiscuous Ports
Private VLANs (PVLANs) provide traffic separation and security at the Layer 2 level. A PVLAN is one
or more pairs of a primary VLAN and a secondary VLAN, all with the same primary VLAN. The two
types of secondary VLANs are called isolated and community VLANs.
In an isolated VLAN, PVLAN hosts communicate only with hosts in the primary VLAN. In a community
VLAN, PVLAN hosts communicate only among themselves and with hosts in the primary VLAN but
not with hosts in isolated VLANs or in other community VLANs. Community VLANs use promiscuous
ports to communicate outside the PVLAN. Regardless of the combination of isolated and community
secondary VLANs, all interfaces within the primary VLAN comprise one Layer 2 domain and require
only one IP subnet.
You can configure a Layer 3 VLAN network interface, or switched virtual interface (SVI), on the
PVLAN promiscuous port, which provides routing functionality to the primary PVLAN.
For more information on configuring PVLAN host and PVLAN promiscuous ports and all other PVLAN
configurations, see the
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide, Release
5.x
.
Routed Ports
A routed port is a physical port that can route IP traffic to another device. A routed port is a Layer 3
interface only and does not support Layer 2 protocols, such as Spanning Tree Protocol (STP). For more
information on routed ports, see the
“Routed Interfaces” section on page 4-2
.
Management Interface
You can use the management Ethernet interface to connect the device to a network for remote
management using a Telnet client, the Simple Network Management Protocol (SNMP), or other
management agents. The management port (mgmt0) is autosensing and operates in full-duplex mode at
a speed of 10/100/1000 Mb/s.
For more information on the management interface, see the
Cisco Nexus 7000 Series NX-OS
Fundamentals Configuration Guide, Release 5.x
. You will also find information on configuring the IP
address and default IP routing for the management interface in this document.